Realism in Teaching Cybersecurity Research: The Agile Research Process

  • Melissa Dark
  • Matt Bishop
  • Richard Linger
  • Luanne Goldrich
Conference paper
Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 453)


As global threats to information systems continue to increase, the value of effective cybersecurity research has never been greater. There is a pressing need to educate future researchers about the research process itself, which is increasingly unpredictable, multi-disciplinary, multi-organizational, and team-oriented. In addition, there is a growing demand for cybersecurity research that can produce fast, authoritative, and actionable results. In short, speed matters. Organizations conducting cyber defense can benefit from the knowledge and experience of the best minds in order to make effective decisions in difficult and fast moving situations. The Agile Research process is a new approach to provide such rapid, authoritative, applied research. It is designed to be fast, transparent, and iterative, with each iteration producing results that can be applied quickly. Purdue University is employing Agile Research as a teaching vehicle in an innovative, multi-university graduate program with government sponsor participation, as described in this paper. Because it simulates real-world operations and processes, this program is equipping students to become effective contributors to cybersecurity research.


Research Problem Biometric System Transferability Principle Industrial Control System Government Sponsor 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.



Melissa Dark and Matt Bishop were supported by the National Science Foundation Grant Number DUE-1344369 to Purdue University, and by a subcontract from Purdue University to the University of California funded by that grant. Matt Bishop was also supported by the National Science Foundation Grant Number OCI-1246061 to the University of California at Davis. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation, Purdue University, or the University of California.

Richard Linger worked on this manuscript as an employee of UT-Battelle, LLC, under Contract No. DE-AC05-00OR22725 with the U.S. Department of Energy. The United States Government retains and the publisher, by accepting the article for publication, acknowledges that the United States Government retains a non-exclusive, paid-up, irrevocable, world-wide license to publish or reproduce the published form of this manuscript, or allow others to do so, for United States Government purposes. This submission was written by the author(s) acting in their own independent capacity and not on behalf of UT-Battelle, LLC, or its affiliates or successors.


  1. 1.
  2. 2.
    Ecs 289m spring quarter 2015: Introduction to research in computer and information security (2015).
  3. 3.
    Branscomb, L.M., Auerswald, P.E.: Between invention and innovation an analysis of funding for early-stage technology development. Technical report NIST GCR 02–841, National Institute for Standards and Technology, Gaithersburg, MD, USA, Nov 2002.
  4. 4.
    Fonash, P., Schneck, P.: Cybersecurity: From months to milliseconds. IEEE Comput. 48(1), 42–50 (2015)CrossRefGoogle Scholar
  5. 5.
    Linger, R., Goldrich, L.: Agile research for cybersecurity. Technical report, Institute for Information Infrastructure Protection, Dartmouth College, Hanover, NH, USA, Jun 2014.
  6. 6.
    Linger, R., Goldrich, L., Bishop, M., Dark, M.: Agile research for cybersecurity: Creating authoritative, actionable knowledge when speed matters. In: Submitted for Publication (2015)Google Scholar
  7. 7.
    Maugham, D.: The need for a national cybersecurity research and development agenda. Commun. ACM 53(2), 29–31 (2010)CrossRefGoogle Scholar

Copyright information

© IFIP International Federation for Information Processing 2015

Authors and Affiliations

  • Melissa Dark
    • 1
  • Matt Bishop
    • 2
  • Richard Linger
    • 3
  • Luanne Goldrich
    • 4
  1. 1.Computer and Information Technology DepartmentPurdue UniversityWest LafayetteUSA
  2. 2.Department of Computer ScienceUniversity of California, DavisDavisUSA
  3. 3.Cyber and Information Security Research GroupOak Ridge National LaboratoryOak RidgeUSA
  4. 4.Johns Hopkins University Applied Physics LaboratoryLaurelUSA

Personalised recommendations